#### Filter Results:

#### Publication Year

2003

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

—A reduced-bit multiplication algorithm based on the ancient Vedic multiplication formulae is proposed in this paper. Both the Vedic multiplication formulae, Urdhva tiryakbhyam and Nikhilam, are first discussed in detail. Urdhva tiryakbhyam, being a general multiplication formula, is equally applicable to all cases of multiplication. It is applied to the… (More)

- A. Mitra, M. Chakraborty, H. Sakai
- IEEE Transactions on Signal Processing
- 2005

An efficient scheme is presented for implementing the LMS-based transversal adaptive filter in block floating-point (BFP) format, which permits processing of data over a wide dynamic range, at temporal and hardware complexities significantly less than that of a floating-point processor. Appropriate BFP formats for both the data and the filter coefficients… (More)

— We describe an effective method for image encryption which employs magnitude and phase manipulation using carrier images. Although it involves traditional methods like magnitude and phase encryptions, the novelty of this work lies in deploying the concept of carrier images for encryption purpose. To this end, a carrier image is randomly chosen from a set… (More)

- A. Mitra, M. Chakraborty
- IEEE Signal Processing Letters
- 2004

We present a novel scheme to implement the normalized least mean square algorithm in block floating-point (BFP) format, which permits processing of data over a wide dynamic range, at a cost significantly less than that of a floating-point processor. Appropriate BFP formats for both the data and the filter coefficients are adopted. Care is taken so that the… (More)

— We introduce an effective approach for automatic offline au-injuries, illness, temperature, age and emotional state as well thentication of handwritten samples where the forgeries are skillfully done, as external factors such as alcohols and drugs [3] – an original i.e., the true and forgery sample appearances are almost alike. Subtle details piece of… (More)

- Abhijit Mitra
- 2007

—Different pseudo-random or pseudo-noise (PN) as well as orthogonal sequences that can be used as spreading codes for code division multiple access (CDMA) cellular networks or can be used for encrypting speech signals to reduce the residual intelligence are investigated. We briefly review the theoretical background for direct sequence CDMA systems and… (More)

- Abhijit Mitra
- 2008

—The paper provides an in-depth tutorial of mathematical construction of maximal length sequences (m-sequences) via primitive polynomials and how to map the same when implemented in shift registers. It is equally important to check whether a polynomial is primitive or not so as to get proper m-sequences. A fast method to identify primitive polynomials over… (More)

— This paper presents a single correlator RAKE receiver for direct sequence code division multiple access (DS-CDMA) systems. In conventional RAKE receivers, multiple correlators are used to despread the multipath signals and then to align and combine those signals in a later stage before making a bit decision. The simplified receiver structure presented… (More)